The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Visible Light communication is a modern communication system. The system consists of a LED and a photo-detector. The white LED can be used to transmit modulated data sequence without any harmful microwave radiation along with its primary purpose of illumination. So, the extra installation of medium for the data transmission can be avoided; leading to a low cost data transmission system. The transmitted...
Wireless technology having great application in office, home and business automation and it is a prominent field of research. ZigBee is built on the top of IEEE 802.15.4 standard for communication in wireless personal area network (WPAN). ZigBee is having feature of low cost of implementation, ease of access, low data over IEEE 802.15.4 standard and other traditional wireless network. ZigBee is mess...
With the inclusion of advanced technologies in the power systems, the issues which are not considered in those days are in need to be investigated. One of the issues that captured the consideration in both transmission and distribution system is Ferroresonance (FR). Though the FR mitigation was done in earlier days, the utility's failure reports indicated its presence in higher magnitudes. This paper...
Authentication means to verify the identity. It is the basis for any communication to take place as we do not want to reveal any information which must not be disclosed. In general, authentication requires the presentation of credentials to prove who the user really is. Authentication can be done either by a client, server or a third party. Authentication protocols allows the user to send or receive...
Rapid development of communications over internet such as online money transaction, transaction of E-mail with sensitive data (medical data) and so on has led to need for strong cryptographic technique. There has been continuous research going on to assure strong security by various cryptanalyst. However, performance, computation time and ease of use play a significant role in using the algorithm...
For the past five decades, de-speckling of Synthetic Aperture Radar (SAR) images is one of the hottest research areas. This research work presents the comprehensive survey about the various de-speckling methods. After studying this survey, the researcher comes to know the various de-speckling techniques also with merits and demerits of each method and the different parameters used to evaluate the...
The susceptibility to Single Event Upset (SEU) is very high for Configuration memory of SRAM based Field Programmable Gate Arrays (FPGA) compared to other FPGA resources. The reduction in feature sizes and core voltages leads to a reduction in the critical charge required to change the state of a memory cell. The SEUs cause failures in the system functionality implemented in FPGA. Fault tolerant techniques...
Wireless Sensor Networks (WSN) is a field which has gained much importance in the past decade. WSN contain sensor nodes which are battery powered and hence reducing energy consumption is the most challenging issue in such systems. One important method to reduce energy consumption in WSN is to do cross layer optimization. This paper gives a PHY-MAC cross layer design which reduces the energy consumption...
A worm is a standalone program, which is self-replicating malware that distributes itself to other computers and networks. An Internet worm can spread across the network and infect millions of computers in very little time. Damages caused by such attacks are considered very high. Worms affect the network packet and its performance. In this paper, different methods are analyzed to detect Internet worms...
With increasing use of power electronics, the amount of harmonics and other power quality problems are increasing in the system. Because of this power quality has been an important topic in the area of research. There are a number of reliability and economic issues with respect to electronic equipment. In such a scenario it is important to study the causes, effects and mitigation technologies for...
Voltage instability is a system stressed phenomena during which distance relay reach issues arises. Zone-3 unit of distance relay is highly affected by such phenomena. Protective relay unable to discriminate the fault situation from voltage unstable condition and issues a trip signal. As, three phase fault and voltage instability are balanced phenomena, zone-3 unit is unable to make a clear discrimination...
This paper introduces electromagnetically coupled hairpin resonator with band pass response in the frequency spectrum. The filter is optimized for low pass band insertion loss, high band stop rejection and good frequency selectivity. The influence of multiple resonators in the filter characteristics is also analyzed. The proposed filters are suitable for wireless communication systems.
E-payment systems by their nature are complex. Thus, with lack of well-designed formal models to provide a suitable method for their modelling and monitoring many challenging tasks will remain unsolvable. The present work aims at designing and implementing an e-Payment Protocols Formalism, PPF, to allow properties examination and verification for e-payment protocols. The proposed formalism was built...
The purpose of the work is development of the model of the information-measuring system of monitoring safe temperature mode of the external surface of technological equipment blocks with the help of thermal imagers. The software for the thermal imager was developed to process the images, as well as the model of the direct heating block of the solid reagents, trials of this model were conducted on...
Channel allocation possibilities of femtocells are analyzed in this work. Femtocells have gained importance in the recent times because of their scope to offer better frequency reuse in cellular systems. They are poised to play their prominent role in future 5G systems also. While allocating the operating frequencies to femtocells, care needs to be taken to avoid interference with neighboring femtocells...
Zigbee is a wireless networking standard which is broadly used in applications such as remote control and sensor applications. They are suited for operation in coarse radio environments and in isolated locations. In Zigbee based wireless networks, various routing protocols such as reactive routing protocols and Zigbee Tree Routing (ZTR) protocol were initially proposed. Among them, ZTR is widely used,...
Floating-point arithmetic plays major role in computer systems. Many of the digital signal processing applications use floating-point algorithms for execution of the floating-point computations and every operating system is answerable practically for floating-point special cases like underflow and overflow. The single precision floating point arithmetic operations are multiplication, division, addition...
The paper introduces an adaptive gain algorithm in which the introduced gain is adaptive to noisy speech signal and frequency channels. The adaptive gain algorithm is a cascaded version of Signal-to-noise ratio based gain and insertion gain. In this paper two combinations of adaptive filtering and adaptive gain algorithms are put forward namely single channel cascaded NR scheme and multi channel cascaded...
Pulse oximeters use photoplethysmographic (PPG) signals for measurement of oxygen saturation in arterial blood. They measure volumetric changes in the blood flowing through the body, usually extremities such as a finger or an ear lobe. The peripheral pulse signal obtained by transmitted light through the illuminated body extremity, gets modulated by heart synchronous pulse, respiratory activity and...
This paper presents a fault detection algorithm for double circuit transmission line incorporated with Thyristor Controlled Series Compensation (TCSC). The proposed algorithm is based on dynamic phasor estimation of current of all the three phases. In this regard, magnitude of transient component of current is calculated in all the three phases for detection of fault. The algorithm is tested for various...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.